Which of the following is considered the best way to protect Personally Identifiable Information (PII) from Web application vulnerabilities?

Which of the following is considered the best way to protect Personally Identifiable Information (PII) from Web application vulnerabilities?
A. Use cryptographic storage to store all PII
B. Use encrypted communications protocols to transmit PII
C. Use full disk encryption on all hard drives to protect PII
D. Use a security token to log into all Web applications that use PII

EC-Council Certified Ethical Hacker v11

Free dumps for 312-50v11 in Printable PDF format.

High quality PDF and software. VALID exam to help you pass.

Download Printable PDF. VALID exam to help you PASS.

5 thoughts on “Which of the following is considered the best way to protect Personally Identifiable Information (PII) from Web application vulnerabilities?

  1. The correct answer is B and the question has been asked again.
    One of the PII rules is to use encrypted communications.

    1. Encrypted communication will prevent MITM attack, lets say. But what if the attacker steals a session(eliminating option D) and retracts the PPI then ?
      I think the ans should be…………………..C.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.